Showing 6,381 - 6,400 results of 13,928 for search '(( whole algorithm ) OR ( while algorithm ))', query time: 0.22s Refine Results
  1. 6381

    Exploring synergistic patterns in bimanual distal limb movements through low dimensional representations by Prajwal Shenoy, S. K. M. Varadhan

    Published 2025-05-01
    “…This could significantly reduce control complexities while designing robotic or prosthetic distal upper limb devices.…”
    Get full text
    Article
  2. 6382

    Experimental Validation of UAV Search and Detection System in Real Wilderness Environment by Stella Dumenčić, Luka Lanča, Karlo Jakac, Stefan Ivić

    Published 2025-07-01
    “…Introducing unmanned aerial vehicles (UAVs) can enhance the efficiency of SAR missions while simultaneously increasing the safety of everyone involved. …”
    Get full text
    Article
  3. 6383

    Alteration in EEG Delta and Beta Power During Working Memory Performance Differentiates Patients with Parkinson’s Disease with and without Dementia by Anita Pal, Madhuri Behari, Ratna Sharma

    Published 2024-12-01
    “…Individuals with PD exhibit altered electroencephalogram (EEG) patterns while engaging in tasks that require WM. The study examined the EEG patterns associated with WM maintenance in PD patients. …”
    Get full text
    Article
  4. 6384

    Comparative Analysis of Dedicated and Randomized Storage Policies in Warehouse Efficiency Optimization by Rana M. Saleh, Tamer F. Abdelmaguid

    Published 2025-06-01
    “…The considered evaluation metrics include transportation cost, average waiting time, and total tardiness, while accounting for product arrival and demand schedules, precedence constraints, and transportation expenses. …”
    Get full text
    Article
  5. 6385

    Hierarchical energy management of distribution network with multi-microgrids based on double Stackelberg game by XIE Yuanhao, LIN Shenghong, ZHU Jianquan

    Published 2025-06-01
    “…In the external game, the distribution network as leader sets the prices, while microgrids as followers adjust their trading strategy with the distribution network. …”
    Get full text
    Article
  6. 6386

    HOLa: HoloLens Object Labeling by Schwimmbeck Michael, Khajarian Serouj, Holzapfel Konstantin, Schmidt Johannes, Remmele Stefanie

    Published 2024-12-01
    “…We introduce a HoloLens-Object-Labeling (HOLa) Unity and Python application based on the SAM-Track algorithm that offers fully automatic single object annotation for HoloLens 2 while requiring minimal human participation. …”
    Get full text
    Article
  7. 6387

    Quantum Conformal Prediction for Reliable Uncertainty Quantification in Quantum Machine Learning by Sangwoo Park, Osvaldo Simeone

    Published 2024-01-01
    “…Quantum machine learning is a promising programming paradigm for the optimization of quantum algorithms in the current era of noisy intermediate-scale quantum computers. …”
    Get full text
    Article
  8. 6388

    Semi-Implicit Continuous Newton Method for Power Flow Analysis by Ruizhi Yu, Wei Gu, Yijun Xu, Shuai Lu, Suhan Zhang

    Published 2025-01-01
    “…As an effective emulator of ill-conditioned power flow, continuous Newton methods (CNMs) have been extensively investigated using explicit and implicit numerical integration algorithms. However, explicit CNMs often suffer from non-convergence due to their limited stability region, while implicit CNMs require additional iterative loops to solve nonlinear equations. …”
    Get full text
    Article
  9. 6389

    TLINet: A defects detection method for insulators of overhead transmission lines using partially transformer block. by Xun Li, Yuzhen Zhao, Yang Zhao, Zhun Guo, Yongming Zhang, Xiangke Jiao, Baoxi Yuan

    Published 2025-01-01
    “…Therefore, accurately focusing on these defects in dynamic and complex natural environments while maintaining inference speed remains a pressing challenge. …”
    Get full text
    Article
  10. 6390

    Improved method for a pedestrian detection model based on YOLO by Yanfei LI, Chengyi DONG

    Published 2025-06-01
    “…To address the dual challenges of excessive energy consumption and operational inefficiency inherent in the reliance of current agricultural machinery on direct supervision, this study developed an enhanced YOLOv8n-SS pedestrian detection algorithm through architectural modifications to the baseline YOLOv8n framework. …”
    Get full text
    Article
  11. 6391

    A comprehensive review of artificial intelligence approaches for smart grid integration and optimization by Malik Ali Judge, Vincenzo Franzitta, Domenico Curto, Andrea Guercio, Giansalvo Cirrincione, Hasan Ali Khattak

    Published 2024-10-01
    “…The advanced metaheuristic algorithms are a good addition to the literature, they are still in emerging stages and their performance can further be improved. …”
    Get full text
    Article
  12. 6392

    Hemorheological system in coronary heart disease patients: prognostic value by L. I. Malinova, P. Yu. Dovgalevsky

    Published 2007-06-01
    “…Various CHD therapy algorithms, depending on hemorheological parameters and ACE risk, were developed.…”
    Get full text
    Article
  13. 6393

    Similar Instances Reuse Based Numerical Control Process Decision Method for Prismatic Parts by Changhong XU, Shusheng ZHANG, Jiachen LIANG, Rui HUANG, Rong BIAN

    Published 2025-01-01
    “…In addition, the existing NC process decision methods, such as the genetic algorithm, ant colony algorithm, and particle swarm algorithm, have not been combined with the reuse approach. …”
    Get full text
    Article
  14. 6394

    Sampled-data control through model-free reinforcement learning with effective experience replay by Bo Xiao, H.K. Lam, Xiaojie Su, Ziwei Wang, Frank P.-W. Lo, Shihong Chen, Eric Yeatman

    Published 2023-02-01
    “…In the sampled-data control strategy, the whole control system is of a hybrid structure, in which the plant is of continuous structure while the controller (RL agent) adopts a discrete structure. …”
    Get full text
    Article
  15. 6395

    Identification of PET/CT radiomic signature for classification of locally recurrent rectal cancer: A network-based feature selection approach by Sara Dalmonte, Maria Adriana Cocozza, Dajana Cuicchi, Daniel Remondini, Lorenzo Faggioni, Paolo Castellucci, Andrea Farolfi, Emilia Fortunati, Alberta Cappelli, Riccardo Biondi, Arrigo Cattabriga, Gilberto Poggioli, Stefano Fanti, Gastone Castellani, Francesca Coppola, Nico Curti

    Published 2025-01-01
    “…Feature selection was performed using a novel approach derived from gene expression analysis, based on the DNetPRO algorithm. The prediction was done using a Support Vector Classifier (SVC) with a 10-fold cross-validation. …”
    Get full text
    Article
  16. 6396

    3D behavior phenotyping and multi-object tracking system of mice based on deep learning by Lei He, Xuezhen Jia, Chen Li, Yan Liu, Jicheng Yu, Zhen-Xia Chen, Wanneng Yang, Xiuying Liang

    Published 2025-08-01
    “…In this study, YOLOv7 was used to detect mice and 3D Kalman Filter, Hungarian algorithm, and improved matching algorithm were used to track mouse identity. …”
    Get full text
    Article
  17. 6397

    A global comparison of social media bot and human characteristics by Lynnette Hui Xian Ng, Kathleen M. Carley

    Published 2025-03-01
    “…., increased hashtags, and positive terms) while humans use cues that require dialogue understanding (e.g. replying to post threads). …”
    Get full text
    Article
  18. 6398

    Optimization of agricultural planting structure in major grain-producing areas based on supply and demand and water resources: A case study of Hebei Province by Wenxue Xia, Jiankang Dong, Bing Zhang, Jingyan Han

    Published 2025-10-01
    “…In the scenario 2, the planting areas for vegetables and fruits increased while the grain planting area decreased by 10.91 %. …”
    Get full text
    Article
  19. 6399

    A Blockchain-Based Architecture of Web3.0: A Comprehensive Decentralized Model With Relay Nodes, Unique IDs and P2P by Hyunjoo Yang, Sejin Park

    Published 2025-01-01
    “…The proposed model integrates a blockchain-based unique ID management system for secure node identification and employs a multistep TPM-based verification algorithm to validate node authenticity in real time. …”
    Get full text
    Article
  20. 6400